11%
11.06.2014
to a number of key packages (e.g., Qemu, libvirt, LXC, MySQL, Docker); and Open vSwitch 2.0 with full kernel integration. OpenStack is certified by Microsoft to host Windows Server 2012 and Windows Server 2008
11%
04.04.2023
.292209: Processing preauth types: PA-FX-FAST (136), PA-ETYPE-INFO2 (19), PA-ENC-TIMESTAMP (2), PA-FX-COOKIE (133)
[...]
[20981] 1655644412.754459: Preauth module encrypted_timestamp (2) (real) returned: 0/Success
11%
30.01.2020
of email addresses:
^[a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+@[a-zA-Z0-9-]+(\.[a-zA-Z0-9-]+)*$
When you see a string like this for the first time, the semantics are not immediately apparent, but regular
11%
20.05.2014
for root
desc=Matched: $0
action=logonly
The rule type in the first line is followed by the pattern type (here, regular expression), the search pattern, the variable definition for the pattern description
11%
27.09.2024
:20:51.998105, 3, pid=1153814, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:502(process_request_send)
process_request_send: [nss_winbind (1153856)] Handling async request: GETPWNAM
11%
28.11.2021
kernel 5.13, support for a wide variety of hardware including x64-64, ARMv7, ARM64, POWER8, POWER9, IBM s390x (LinuxONE), and RISC-V, and software updates such as Qemu 6.0, libvirt 7.6, PHP 8.0.8, Apache 2
11%
28.11.2021
issuing specific domain certificates.
A CAA record for your domain that only allows the use of Let's Encrypt could look like:
domainname.tld CAA 0 issue "letsencrypt.org"
Additionally, if you want
11%
07.08.2025
.6%)
16 to 20 years (11.8%)
21 to 30 years (14.6%)
31 to 40 years (7%)
41 to 50 years (3.1%)
More than 50 years (0.5%)
Read more at Stack Overflow.
11%
30.03.2012
to "0" to make the
# command run *after* the blocking has occurred.
#
KILL_RUN_CMD_FIRST = "0"
#
#
KILL_RUN_CMD="commands_to_run"
Customization
I came across a few limitations with the way a third
11%
10.05.2012
need is a little patience and light scripting skills. PowerShell versions 1.0 and 2.0 have a somewhat limited ability to grab information from remote systems singly or in bulk. Therefore, you have